Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security authentication method and terminal

A security authentication and terminal technology, which is applied in the field of information security, can solve problems such as inability to guarantee information security, select authentication methods, and fail to meet user security needs, so as to meet information security needs and improve information security.

Inactive Publication Date: 2016-09-21
SHENZHEN GIONEE COMM EQUIP
View PDF4 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, most fingerprint identification algorithms are matching algorithms based on minutiae features, that is, as long as the fingerprint minutiae features can reach a predetermined matching degree, the verification can be completed. This verification method is safe and efficient enough, but with the rapid development of high technology, Some hackers can easily steal the user's complete fingerprint information, so the traditional fingerprint authentication method will not be able to meet the user's security needs
On the other hand, when performing authentication, an appropriate authentication method is not selected according to different terminal usage scenarios. For example, for some applications with a higher security level, using the same authentication method as an application with a lower security level cannot guarantee information security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security authentication method and terminal
  • Security authentication method and terminal
  • Security authentication method and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0021] It should be understood that when used in this specification and the appended claims, the terms "comprising" and "comprises" indicate the presence of described features, integers, steps, operations, elements and / or components, but do not exclude one or Presence or addition of multiple other features, integers, steps, operations, elements, components and / or collections thereof.

[0022] see figure 1 , is a schematic flowchart of a security ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a security authentication method and a terminal. The method comprises the steps of determining a security level of terminal authentication according to usage scenario of the terminal, wherein the usage scenario comprises the distance between the terminal and a user or an application type corresponding to the terminal authentication; and starting different security authentication mechanisms according to the security level of the terminal authentication. The terminal comprises a determining unit for determining the security level of the terminal authentication according to the usage scenario of the terminal, wherein the usage scenario comprises the distance between the terminal and the user or the application type corresponding to the terminal authentication; and an authentication unit for starting different security authentication mechanisms according to the security level of the terminal authentication. According to the method and the terminal provided by the embodiment of the invention, the information security of the user can be improved, and the information security demand of the user can be satisfied.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to a security authentication method and a terminal. Background technique [0002] With the popularization of terminal devices such as mobile phones and pads, users can use the terminal for information exchange, online payment, etc., and the terminal has become an important communication tool for today's communication. The information security on the terminal and the information security of the terminal communication are becoming more and more important. [0003] As a method of security authentication, fingerprints are widely used in many scenarios, such as fingerprint recognition to boot, enter specific applications, and make online payments. At present, most fingerprint identification algorithms are matching algorithms based on minutiae features, that is, as long as the fingerprint minutiae features can reach a predetermined matching degree, the verification c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/102H04L63/104H04L63/105
Inventor 余超赵星星
Owner SHENZHEN GIONEE COMM EQUIP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products